US20160105437A1 - Device and authentication system - Google Patents

Device and authentication system Download PDF

Info

Publication number
US20160105437A1
US20160105437A1 US14/973,529 US201514973529A US2016105437A1 US 20160105437 A1 US20160105437 A1 US 20160105437A1 US 201514973529 A US201514973529 A US 201514973529A US 2016105437 A1 US2016105437 A1 US 2016105437A1
Authority
US
United States
Prior art keywords
challenge
response
unit
generated
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US14/973,529
Other versions
US10057262B2 (en
Inventor
Kiichi YOKOYAMA
Moyuru Kobayashi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Toppan Inc
Original Assignee
Toppan Printing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Toppan Printing Co Ltd filed Critical Toppan Printing Co Ltd
Assigned to TOPPAN PRINTING CO., LTD. reassignment TOPPAN PRINTING CO., LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: KOBAYASHI, MOYURU, YOKOYAMA, Kiichi
Publication of US20160105437A1 publication Critical patent/US20160105437A1/en
Application granted granted Critical
Publication of US10057262B2 publication Critical patent/US10057262B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3278Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]

Definitions

  • the present invention relates to authentication devices and systems.
  • a challenge-response protocol (for example, see PTL 1).
  • an information processing device to be authenticated such as an IC card or an IC tag sends an authentication request to an authentication device such as an IC reader, and the authentication device replies by sending a challenge, which is a random value, to the information processing device.
  • the information processing device generates a response on the basis of the received challenge and a specific value being processed under an authentication algorithm, and transmits the generated response to the authentication device.
  • the authentication device also generates a response on the basis of the challenge transmitted to the information processing device and a specific value pre-registered in the authentication device, and compares the generated response with the response received from the information processing device. When the two responses match each other, authentication is successful. On the other hand, when the two responses do not match each other, authentication is unsuccessful.
  • the response is generated by using a one-way function or the like. Accordingly, even if only the response is leaked, it is impossible to obtain the original challenge from the response. Therefore, the above authentication protocol can achieve high security.
  • Patent Literature 1 JP-A-H10-247140
  • An object of the present invention is to provide a device and an authentication system which can achieve high security even if a set of challenge and response is intercepted or wiretapped.
  • a device that attempts to improve or solve the above problem includes a storage unit that stores generated challenges which are challenges previously generated, a determination unit that determines whether a newly generated challenge matches any of the generated challenges or not, an output unit that outputs the newly generated challenge as an unused challenge when the determination unit determines that the newly generated challenge does not match any of the generated challenges, and a registration unit that stores the newly generated challenge as a new generated challenge in the storage unit when the determination unit determines that the newly generated challenge does not match any of the generated challenges.
  • the registration unit deletes the generated challenges from the storage unit when a predetermined period of time has elapsed.
  • the above device further include a challenge generating unit that generates a challenge, the challenge generated by the challenge generating unit being the newly generated challenge, a challenge transmitting unit that transmits the unused challenge outputted from the output unit to an external device, a response receiving unit that receives a response generated by using the unused challenge from the external device, and an authentication processing unit that authenticates by using the unused challenge and the response received from the external device.
  • a challenge generating unit that generates a challenge, the challenge generated by the challenge generating unit being the newly generated challenge
  • a challenge transmitting unit that transmits the unused challenge outputted from the output unit to an external device
  • a response receiving unit that receives a response generated by using the unused challenge from the external device
  • an authentication processing unit that authenticates by using the unused challenge and the response received from the external device.
  • the above device further include a challenge receiving unit that receives a challenge from the external device, a response generating unit that generates a response by using the unused challenge outputted from the output unit, and a response transmitting unit that transmits the response to the external device, wherein the determination unit determine whether the newly generated challenge matches any of the generated challenges or not by using the challenge received from the external device as the newly generated challenge.
  • An authentication system that solves the above problem includes a first device and a second device, the first device including a challenge generating unit that generates a challenge, a response receiving unit that receives a response, and an authentication processing unit that performs authentication by using the challenge and the response, one of the first device and the second device including a storage unit that stores generated challenges which are challenges previously generated, a determination unit that determines whether a newly generated challenge matches any of the generated challenges or not, an output unit that outputs the newly generated challenge as an unused challenge when the determination unit determines that the newly generated challenge does not match any of the generated challenges, and a registration unit that stores the newly generated challenge as a new generated challenge in the storage unit when the determination unit determines that the newly generated challenge does not match any of the generated challenges, and the second device including a response generating unit that generates the response by using the unused challenge, and a response transmitting unit that transmits the response.
  • the registration unit deletes the generated challenges from the storage unit when a predetermined period of time has elapsed.
  • the second device includes a physical unclonable function (PUF)
  • the response generating unit generates the response on the basis of the PUF by using the unused challenge
  • the first device includes a storage unit that stores PUF information which represents a property of the PUF contained in the second device
  • the authentication processing unit performs authentication by using the unused challenge, the PUF information, and the response received from the second device.
  • PUF physical unclonable function
  • the first device includes a PUF
  • the authentication processing unit performs the authentication on the basis of the PUF
  • the second device includes a storage unit that stores PUF information which represents a property of the PUF contained in the first device
  • the response generating unit generates the response by using the unused challenge and the PUF information.
  • the above authentication system further include a relay device
  • the relay device include a relay challenge receiving unit that receives the challenge from the first device, a relay challenge transmitting unit that transmits the challenge received by the relay challenge receiving unit to the second device, a relay response receiving unit that receives the response from the second device, and a relay response transmitting unit that transmits the response received by the relay response receiving unit to the first device, the first device transmits the challenge to the second device via the relay device, and the second device transmits the response to the first device via the relay device.
  • the relay device includes a PUF, a storage unit that stores the challenge received from the first device, and a relay response generating unit that generates a response on the basis of the PUF contained in the relay device by using the unused challenge, the relay response transmitting unit transmits the response received from the second device and the response generated by the relay response generating unit to the first device, and the authentication processing unit of the first device performs authentication by using the unused challenge, the response generated by the response generating unit of the second device, and the response generated by the relay response generating unit of the relay device.
  • a higher security can be achieved in the challenge-response authentication even if a set of challenge and response is intercepted or wiretapped.
  • FIG. 1 is a configuration diagram which shows an example of configuration of an authentication system according to a first embodiment.
  • FIG. 2 is a configuration diagram which shows an example of configuration of an authentication device in the authentication system according to the first embodiment.
  • FIG. 3 is a view which shows an example of data configuration of a generated challenge which is stored in the authentication device according to the first embodiment.
  • FIG. 4 is a view which shows an example of data configuration of PUF information which is stored in the authentication device according to the first embodiment.
  • FIG. 5 is a configuration diagram which shows an example of configuration of an information processing device in the authentication system according to the first embodiment.
  • FIG. 6 is a sequence diagram which shows an example of authentication procedure in the authentication system according to the first embodiment.
  • FIG. 7 is a configuration diagram which shows an example of configuration of the authentication system according to a second embodiment.
  • FIG. 8 is a configuration diagram which shows an example of configuration of an authentication device in the authentication system according to the second embodiment.
  • FIG. 9 is a configuration diagram which shows an example of configuration of a relay device in the authentication system according to the second embodiment.
  • FIG. 10 is a sequence diagram which shows an example of authentication procedure in the authentication system according to the second embodiment.
  • FIG. 11 is a configuration diagram which shows an example of a communication device in the authentication system according to a third embodiment.
  • FIG. 12 is a configuration diagram which shows an example of configuration of the information processing device in the authentication system according to the third embodiment.
  • FIG. 13 is a sequence diagram which shows an example of authentication procedure in the authentication system according to the third embodiment.
  • an authentication system includes an authentication device 10 and an information processing device 20 .
  • One example of the authentication device 10 is an IC reader/writer, and one example of the information processing device 20 is an IC tag.
  • the authentication device 10 includes a contactless communication unit 11 , a control unit 12 , a storage unit 13 , a PUF authentication processing unit 14 which is an example of authentication processing unit, and a challenge generating unit 15 .
  • a PUF is a function that extracts a difference in physical properties of ICs and reflects it to the output.
  • the properties of ICs extracted by the PUF are physical properties which are different due to variation incurred during manufacturing of ICs, and are unclonable since they are unique to each IC.
  • a PUF can be used for identification of ICs.
  • a PUF circuit which is a specific circuit that outputs a value unique to each IC is provided in the ICs so that the output value from the PUF circuit is used for identification of ICs.
  • a delay time difference measurable arbiter PUF that generates a response based on the delay time difference between the signals generated in the PUF circuit is used.
  • the contactless communication unit 11 has a function as an interface for contactless communication between the authentication device 10 and the information processing device 20 , and serves as a challenge transmitting unit and a response receiving unit.
  • the control unit 12 controls communication and information processing, and serves as a determination unit, a registration unit and an output unit.
  • the challenge generating unit 15 generates a challenge used for authentication.
  • a challenge which is typically a random number, varies at each time of generation.
  • approximately 4,300 million random numbers may be generated as a challenge by the challenge generating unit 15 .
  • the storage unit 13 stores the challenges which have been previously generated by the challenge generating unit 15 .
  • the challenges previously generated by the challenge generating unit 15 may be stored associated with each ID of the information processing device 20 which is a transmission destination of the challenge.
  • the ID of the information processing device 20 is identification information of the information processing device 20 , which is uniquely allocated to each information processing device 20 .
  • the storage unit 13 stores the IDs of the information processing devices 20 and parameters which represent correlation between input data and output data of the PUF circuits in the information processing devices 20 , both being associated with each other as shown in FIG. 4 .
  • the parameter is an example of PUF information that indicates the properties of the PUF.
  • the PUF authentication processing unit 14 serves as a comparison response generating unit. Specifically, on receiving a response from the information processing device 20 , the PUF authentication processing unit 14 reads out the parameter associated with the ID of the information processing device 20 from the storage unit 13 , and generates a comparison response on the basis of the challenge transmitted to the information processing device 20 and the parameter read out from the storage unit 13 . Then, the PUF authentication processing unit 14 compares the generated comparison response and the response received from the information processing device 20 , and determines whether the comparison response matches the received response.
  • the authentication device 10 can start processing.
  • the processing performed by the authentication device 10 may include reading and writing of the data possessed by the information processing device 20 . Specifically, management of IDs, money and points are performed.
  • the comparison result shows that two responses do not match each other, authentication is unsuccessful.
  • the PUF authentication processing unit 14 may determine that two responses match each other.
  • the authentication device 10 is not limited to an IC reader/writer, and may be a mobile terminal such as smartphone and tablet computer, or an installation type device.
  • the authentication device 10 may perform contact communication with the information processing device 20 .
  • a contact communication unit as an interface for contact communication can be provided in the authentication device 10 .
  • the information processing device 20 includes a contactless communication unit 21 , a control unit 22 , a storage unit 23 and a PUF circuit 24 , which is described above.
  • the contactless communication unit 21 has a function as an interface for contactless communication between the information processing device 20 and the authentication device 10 , and serves as a challenge receiving unit and a response transmitting unit.
  • the control unit 22 controls communication and information processing, and serves as a response generating unit.
  • the storage unit 23 stores the data such as the IDs of the aforementioned information processing devices 20 .
  • the PUF circuit 24 outputs an output value which is unique to each information processing device 20 .
  • the output value can be used for identification of ICs, and thus identification of the information processing devices 20 .
  • the information processing device 20 is not limited to an IC tag, but may also be a mobile terminal such as IC card, smartphone which carries an IC, cell phone, and tablet computer.
  • the authentication device 10 may perform contact communication with the information processing device 20 .
  • a contact communication unit as an interface for contact communication can be provided in the information processing device 20 .
  • the information processing device 20 is brought closer to the authentication device 10 , or alternatively, the information processing device 20 is connected to the authentication device 10 to start communication (step S 101 ).
  • the authentication device 10 requests the ID of the information processing device 20 to the information processing device 20 (step S 102 ).
  • the information processing device 20 transmits the ID of the information processing device 20 to the authentication device 10 in response to the request from the authentication device 10 (step S 103 ).
  • the challenge generating unit 15 of the authentication device 10 generates a challenge (step S 104 ).
  • the control unit 12 of the authentication device 10 checks if the generated challenge matches any of the previously generated challenges (step S 105 ). Specifically, the authentication device 10 compares a list of previously generated challenges which are the challenges stored in the storage unit 13 with the newly generated challenge. When the comparison result shows that the newly generated challenge does not match any of the generated challenges, the control unit 12 of the authentication device 10 outputs the newly generated challenge as an unused challenge to the contactless communication unit 11 so that the contactless communication unit 11 transmits the unused challenge to the information processing device 20 (step S 106 ). Further, the control unit 12 of the authentication device 10 adds the newly generated challenge to the list of generated challenges by allowing the storage unit 13 to store the newly generated challenge.
  • step S 104 the authentication device 10 again generates a challenge.
  • the authentication device 10 checks if the generated challenge matches any of the previously generated challenges in step S 105 .
  • the authentication device 10 repeats step S 104 and step S 105 until a challenge which is different from the previously generated challenges is generated.
  • the authentication device 10 may compare the challenges included in the list of the generated challenges with the newly generated challenge so that it determines the newly generated challenge as an unused challenge when the newly generated challenge does not match any of the generated challenges.
  • the authentication device 10 may check the challenge for each ID of the information processing device 20 . That is, the authentication device 10 compares the challenges associated with the ID of the information processing device 20 which is the target of the current authentication, that is, the ID the same as that received from the information processing device 20 in step S 103 among the generated challenges stored in the storage unit 13 , with the newly generated challenge. When the comparison result shows that any of the generated challenges does not match the newly generated challenge, the authentication device 10 determines the newly generated challenge as an unused challenge even if any of the generated challenges associated with the ID of another information processing device 20 matches the newly generated challenge.
  • the authentication device 10 may delete the generated challenge stored in the storage unit 13 .
  • the control unit 12 of the authentication device 10 deletes the challenge from the storage unit 13 when one year has elapsed from the generation of the challenge.
  • a starting point of the predetermined period of time is not only the time of generation of the challenge, but may be defined as appropriate.
  • the control unit 22 of the information processing device 20 When the contactless communication unit 21 of the information processing device 20 receives the challenge from the authentication device 10 , the control unit 22 of the information processing device 20 generates a response by using the received challenge (step S 107 ). When the authentication protocol based on PUF is used, the information processing device 20 generates a response by using an output value from the PUF circuit 24 which uses the received challenge as an input value.
  • the response generated by the information processing device 20 is transmitted from the contactless communication unit 21 of the information processing device 20 to the authentication device 10 (step S 108 ).
  • the PUF authentication processing unit 14 of the authentication device 10 performs authentication by using the response received from the information processing device 20 via the contactless communication unit 11 of the authentication device 10 (step S 109 ). Specifically, the storage unit 13 of the authentication device 10 generates a comparison response on the basis of the parameter of PUF which is stored associated with the ID the same as the ID received from the information processing device 20 at step S 103 and the challenge transmitted to the information processing device 20 . Then, the authentication device 10 compares the generated comparison response and the response received from the information processing device 20 , and determines whether the comparison response matches the received response or not.
  • the authentication device 10 authenticates the information processing device 20 .
  • so-called mutual authentication is also possible in which the information processing device 20 also authenticates the authentication device 10 .
  • the method of authenticating the authentication device 10 by the information processing device 20 may be a known method.
  • the authentication device 10 is an example of the first device and the information processing device 20 is an example of the second device. Further, the first device determines whether the newly generated challenge matches the generated challenge or not.
  • the authentication system includes the authentication device 10 , the information processing device 20 and a relay device 30 .
  • One example of the authentication device 10 is a server, one example of the information processing device 20 is an IC tag, and one example of the relay device 30 is an IC reader/writer.
  • the authentication device 10 and the relay device 30 are connected to a network NW such as Internet.
  • the authentication device 10 transmits one challenge to the relay device 30 , and the relay device 30 can transmit the challenge to a plurality of information processing devices 20 . Accordingly, the authentication device 10 can apply one challenge to a plurality of information processing devices 20 without generating a challenge for each of the information processing devices 20 .
  • the authentication device 10 includes a communication unit 16 , the control unit 12 having the same configuration as that of the first embodiment, the storage unit 13 , the PUF authentication processing unit 14 which is an example of authentication processing unit, and the challenge generating unit 15 . Also in the second embodiment, an example in which the challenge-response authentication protocol using a PUF will be described. Only the information processing device 20 may have the PUF, or alternatively, both the information processing device 20 and the relay device 30 may have the PUF.
  • the communication unit 16 has a function as an interface for communication between the authentication device 10 and the relay device 30 , and serves as a challenge transmitting unit and a response receiving unit.
  • the control unit 12 controls communication and information processing, and serves as a determination unit, a registration unit and an output unit.
  • the challenge generating unit 15 generates a challenge used for authentication.
  • the storage unit 13 stores the challenges which have been previously generated by the challenge generating unit 15 .
  • the challenges previously generated by the challenge generating unit 15 may be stored associated with each ID of the information processing device 20 which is a transmission destination of the challenge. Further, the challenges previously generated by the challenge generating unit 15 may be stored associated with each ID of the relay device 30 which is a transmission destination of the challenge.
  • the ID of the relay device 30 is identification information of the relay device 30 , which is uniquely allocated to each relay device 30 .
  • the storage unit 13 stores the IDs of the information processing devices 20 and parameters which represent properties of the PUF of the information processing devices 20 , both being associated with each other.
  • the PUF authentication processing unit 14 serves as a comparison response generating unit. Specifically, on receiving a response from the information processing device 20 via the relay device 30 , the PUF authentication processing unit 14 reads out the parameter associated with the ID of the information processing device 20 from the storage unit 13 , and generates a comparison response on the basis of the challenge transmitted to the information processing device 20 via the relay device 30 and the parameter read out from the storage unit 13 . Then, the PUF authentication processing unit 14 compares the generated comparison response and the response received from the information processing device 20 via the relay device 30 , and determines whether the comparison response matches the received response.
  • the PUF authentication processing unit 14 may determine that two responses match each other.
  • the storage unit 13 stores the ID of the relay device 30 and parameters which represent properties of the PUF of the relay device 30 , both being associated with each other.
  • the PUF authentication processing unit 14 On receiving a response from the relay device 30 , the PUF authentication processing unit 14 reads out the parameter associated with the ID of the relay device 30 from the storage unit 13 , and generates a comparison response on the basis of the challenge transmitted to the relay device 30 and the parameter read out from the storage unit 13 . Then, the PUF authentication processing unit 14 compares the generated comparison response and the response received from the relay device 30 , and determines whether the comparison response matches the received response.
  • the PUF authentication processing unit 14 may determine that two responses match each other.
  • the authentication device 10 is not limited to a server, and may be a mobile terminal such as smartphone and tablet computer.
  • the information processing device 20 has the same configuration as that of the information processing device 20 of the first embodiment shown in FIG. 5 except that the contactless communication unit 21 performs contactless communication with the relay device 30 .
  • the relay device 30 may perform contact communication with the information processing device 20 .
  • the information processing device 20 includes a contact communication unit.
  • the relay device 30 includes a contactless communication unit 31 , a control unit 32 , a storage unit 33 , a PUF circuit 34 , and a communication unit 35 .
  • the contactless communication unit 31 has a function as an interface for contactless communication between the relay device 30 and the information processing device 20 , and serves as a relay challenge transmitting unit and a relay response receiving unit.
  • the control unit 32 controls communication and information processing, and serves as a relay response generating unit.
  • the storage unit 33 stores the data such as the IDs of the aforementioned relay device 30 .
  • the PUF circuit 34 outputs an output value which is unique to each relay device 30 .
  • the output value can be used for identification of ICs, and thus identification of the relay devices 30 .
  • Authentication of the relay device 30 can be performed by using the authentication protocol using the PUF of the relay device 30 . Specifically, if an improper relay device 30 is used, it is possible to detect that the relay device 30 is improper. Furthermore, when authentication of the relay device 30 using the PUF is not performed, the PUF circuit 34 may not be provided in the relay device 30 .
  • the communication unit 35 has a function as an interface for communication between the relay device 30 and the authentication device 10 , and serves as a relay challenge receiving unit and a relay response transmitting unit.
  • the relay device 30 is not limited to an IC reader/writer, and may be a mobile terminal such as smartphone and tablet computer, or an installation type device.
  • the relay device 30 may perform contact communication with the information processing device 20 .
  • the relay device 30 may perform contact communication with the information processing device 20 .
  • a contact communication unit as an interface for contact communication can be provided in the relay device 30 .
  • the information processing device 20 is brought closer to the relay device 30 , or alternatively, the information processing device 20 is connected to the relay device 30 to start communication (step S 201 ).
  • the relay device 30 requests the ID of the information processing device 20 to the information processing device 20 (step S 202 ).
  • the information processing device 20 transmits the ID of the information processing device 20 to the relay device 30 in response to the request from the relay device 30 (step S 203 ).
  • the relay device 30 transmits the ID of the information processing device 20 received from the information processing device 20 and the ID of the relay device 30 to the authentication device 10 (step S 204 ). If there are a plurality of information processing devices 20 , step S 201 to step S 204 are repeated for the number of information processing devices 20 .
  • the challenge generating unit 15 of the authentication device 10 generates a challenge (step S 205 ).
  • the control unit 12 of the authentication device 10 checks if the generated challenge matches any of the previously generated challenges (step S 206 ). Specifically, the authentication device 10 compares a list of previously generated challenges which are the challenges stored in the storage unit 13 with the newly generated challenge. When the comparison result shows that the newly generated challenge does not match any of the generated challenges, the control unit 12 of the authentication device 10 outputs the newly generated challenge as an unused challenge to the communication unit 16 so that the communication unit 16 transmits the unused challenge to the relay device 30 (step S 207 ). Further, the control unit 12 of the authentication device 10 adds the newly generated challenge to the list of generated challenges by allowing the storage unit 13 to store the newly generated challenge.
  • step S 205 the authentication device 10 again generates a challenge.
  • the authentication device 10 checks if the generated challenge matches any of the previously generated challenges in step S 206 .
  • the authentication device 10 repeats step S 205 and step S 206 until a challenge which is different from the previously generated challenges is generated.
  • the authentication device 10 may compare the challenges included in the list of the generated challenges with the newly generated challenge.
  • the authentication device 10 may check the challenge for each ID of the information processing device 20 or each ID of the relay device 30 . It is possible to achieve higher security in a configuration in which the challenges in the list of generated challenges is compared with the newly generated challenge.
  • the authentication device 10 may delete the generated challenge stored in the storage unit 13 .
  • the control unit 12 of the authentication device 10 deletes the challenge from the storage unit 13 when one year has elapsed from the generation of the challenge.
  • a starting point of the predetermined period of time is not only the time of generation of the challenge, but may be defined as appropriate.
  • the relay device 30 stores the challenge by allowing the storage unit 33 to store the received challenge (step S 208 ). Then, the contactless communication unit 31 of the relay device 30 transmits the challenge received from the authentication device 10 to the information processing device 20 (step S 209 ). If there are a plurality of information processing devices 20 , the relay device 30 transmits the challenge to each of the information processing devices 20 .
  • the control unit 22 of the information processing device 20 When the contactless communication unit 21 of the information processing device 20 receives the challenge from the relay device 30 , the control unit 22 of the information processing device 20 generates a response by using the received challenge (step S 210 ). When the authentication protocol based on PUF is used, the information processing device 20 generates a response by using an output value from the PUF circuit 24 which uses the received challenge as an input value.
  • the response generated by the information processing device 20 is transmitted from the contactless communication unit 21 of the information processing device 20 to the relay device 30
  • the response generated by the information processing device 20 is transmitted from the contactless communication unit 21 of the information processing device 20 to the (step S 211 ). If there are a plurality of information processing devices 20 , each of the information processing devices 20 generate the response and transmit it to the relay device 30 .
  • control unit 32 of the relay device 30 generates a response by using the challenge stored in step S 208 (step S 212 ).
  • the relay device 30 When the authentication of the relay device 30 by using the PUF is performed, the relay device 30 generates a response by using an output value from the PUF circuit 34 which uses the received challenge as an input value.
  • the communication unit 35 of the relay device 30 transmits the response generated by the information processing device 20 and the response generated by the relay device 30 to the authentication device 10 (step S 213 ).
  • the PUF authentication processing unit 14 of the authentication device 10 performs authentication by using two responses that the communication unit 16 of the authentication device 10 has received from the relay device 30 (step S 214 ). Specifically, the storage unit 13 of the authentication device 10 generates a comparison response on the basis of the parameter of PUF which is stored associated with the ID the same as the ID of the information processing device 20 received at step S 204 and the challenge transmitted to the information processing device 20 . Then, the authentication device 10 compares the generated comparison response and the response generated by the information processing device 20 , and determines whether the comparison response matches the response generated by the information processing device 20 or not.
  • the storage unit 13 of the authentication device 10 generates a comparison response on the basis of the parameter of PUF which is stored associated with the ID the same as the ID of the relay device 30 received at step S 204 and the challenge transmitted to the relay device 30 . Then, the authentication device 10 compares the generated comparison response and the response generated by the relay device 30 , and determines whether the comparison response matches the response generated by the relay device 30 or not.
  • the comparison result shows that both responses match the comparison response
  • authentication is successful and the authentication device 10 transmits the authentication result to the relay device 30 (step S 215 ).
  • the relay device 30 starts processing (step S 216 ).
  • the processing performed by the relay device 30 may include reading and writing of the data contained in the information processing device 20 .
  • the authentication of the relay device 30 is performed, that is, the relay device 30 generates a response.
  • the relay device 30 may not generate a response and the authentication of the relay device 30 may not be performed.
  • authentication is performed by using only the response generated by the information processing device 20 . Nonetheless, it is possible to achieve higher security in a configuration in which the authentication of the relay device 30 is performed since the use of improper relay device 30 can be prevented.
  • the authentication device 10 authenticates the relay device 30 and the information processing device 20 at the same time.
  • the authentication procedure by the authentication device 10 is not limited to that.
  • the authentication device 10 may first perform authentication of the relay device 30 , and then perform authentication of the information processing device 20 when the authentication of the relay device 30 is successful.
  • the authentication device 10 authenticates both the relay device 30 and the information processing device 20 .
  • so-called mutual authentication is also possible in which the relay device 30 and the information processing device 20 also authenticates the authentication device 10 .
  • Authentication method performed by the relay device 30 and the information processing device 20 to authenticate the authentication device 10 may be a known method.
  • the authentication device 10 is an example of the first device and the information processing device 20 is an example of the second device. Further, the first device determines whether the newly generated challenge matches the generated challenge or not.
  • the authentication system of the third embodiment includes a communication device 40 which is an IC reader/writer and the information processing device 20 such as an IC tag. Also in the third embodiment, an example which uses a challenge-response authentication protocol using a PUF will be described.
  • the communication device 40 includes a contactless communication unit 41 , a control unit 42 , and a storage unit 43 .
  • the contactless communication unit 41 has a function as an interface for contactless communication between the communication device 40 and the information processing device 20 , and serves as a challenge receiving unit and a response transmitting unit.
  • the control unit 42 controls communication and information processing, and serves as a determination unit, a registration unit, an output unit, and a response generating unit.
  • the storage unit 43 stores the challenges that the communication device 40 has received from the information processing device 20 , that is, the challenges which have been previously generated by the information processing device 20 .
  • the challenges which have been previously generated by the information processing device 20 may be stored associated with each ID of the information processing device 20 which has generated the challenge.
  • the storage unit 43 stores the IDs of the information processing devices 20 and parameters which represent properties of the PUF of the information processing devices 20 , both being associated with each other.
  • the communication device 40 is not limited to an IC reader/writer, and may be a mobile terminal such as smartphone and tablet computer, or an installation type device.
  • the communication device 40 may perform contact communication with the information processing device 20 .
  • the contactless communication unit 41 or in addition to the contactless communication unit 41 , a contact communication unit as an interface for contact communication can be provided in the communication device 40 .
  • the information processing device 20 includes the contactless communication unit 21 , the control unit 22 , the storage unit 23 , the PUF circuit 24 , a PUF authentication processing unit 25 which is an example of authentication processing unit, and a challenge generating unit 26 .
  • the contactless communication unit 21 has a function as an interface for contactless communication between the information processing device 20 and the communication device 40 , and serves as a challenge transmitting unit and a response receiving unit.
  • the control unit 22 controls communication and information processing.
  • the storage unit 23 stores the data such as the IDs of the information processing devices 20 .
  • the PUF circuit 24 outputs an output value which is unique to each information processing device 20 .
  • the challenge generating unit 26 generates a challenge used for authentication.
  • the PUF authentication processing unit 25 serves as a comparison response generating unit, and generates a comparison response on the basis of the challenge transmitted to the communication device 40 by using the PUF circuit 24 .
  • the PUF authentication processing unit 25 compares the generated comparison response and the response received from the communication device 40 , and determines whether the comparison response matches the received response.
  • the PUF authentication processing unit 25 may determine that two responses match each other.
  • the information processing device 20 is not limited to an IC tag, and may be a mobile terminal such as IC card, smartphone which carries an IC, cell phone, and tablet computer.
  • the communication device 40 may perform contact communication with the information processing device 20 .
  • a contact communication unit as an interface for contact communication can be provided in the information processing device 20 .
  • the information processing device 20 is brought closer to the communication device 40 , or alternatively, the information processing device 20 is connected to the communication device 40 to start communication (step S 301 ).
  • the communication device 40 requests the information processing device 20 to transmit an ID of the information processing device 20 and a challenge (step S 302 ).
  • the challenge generating unit 26 of the information processing device 20 In response to the request from the communication device 40 , the challenge generating unit 26 of the information processing device 20 generates a challenge (step S 303 ).
  • the contactless communication unit 21 of the information processing device 20 transmits the generated challenge and the ID of the information processing device 20 to the communication device 40 (step S 304 ).
  • the control unit 42 of the communication device 40 checks if the challenge that the contactless communication unit 41 of the communication device 40 has received from the information processing device 20 matches any of the previously generated challenges (step S 305 ). Specifically, the communication device 40 compares a list of previously generated challenges which are the challenges stored in the storage unit 43 with the newly generated challenge at the information processing device 20 . When the comparison result shows that the newly generated challenge does not match any of the generated challenges, the control unit 42 of the communication device 40 outputs the newly generated challenge as an unused challenge. Further, the control unit 42 of the communication device 40 adds the newly generated challenge to the list of generated challenges by allowing the storage unit 13 to store the newly generated challenge.
  • step S 302 the communication device 40 again requests the information processing device 20 to transmit the challenge. Then, the information processing device 20 repeats generation of a challenge, and the communication device 40 repeats checking of the challenge. Accordingly, step S 302 to step S 305 are repeated until a challenge which is different from the previously generated challenges is generated.
  • the communication device 40 may compare the challenges included in the list of the generated challenges with the newly generated challenge, or alternatively, the communication device 40 may compare the challenges for each ID of the information processing device 20 .
  • the communication device 40 may delete the generated challenge stored in the storage unit 43 .
  • the control unit 42 of the communication device 40 deletes the challenge from the storage unit 43 when one year has elapsed from the generation of the challenge.
  • a starting point of the predetermined period of time is not only the time of generation of the challenge, but may be defined as appropriate.
  • control unit 42 of the communication device 40 generates a response by using the unused challenge (step S 306 ).
  • the storage unit 43 of the communication device 40 generates a response on the basis of the parameter of PUF which is stored associated with the ID the same as the ID of the information processing device 20 received at step S 304 and the unused challenge.
  • the contactless communication unit 41 of the communication device 40 transmits the generated response to the information processing device 20 (step S 307 ).
  • the PUF authentication processing unit 25 of the information processing device 20 performs authentication by using the response that the contactless communication unit 21 of the information processing device 20 received from the communication device 40 (step S 308 ). Specifically, the information processing device 20 generates a comparison response by using the challenge transmitted to the communication device 40 . When the authentication protocol based on PUF is used, the information processing device 20 generates a comparison response by using an output value from the PUF circuit 24 which is obtained by using the challenge transmitted to the communication device 40 as an input value. Then, the information processing device 20 compares the comparison response and the response received from the communication device 40 , and determines whether the comparison response matches the received response or not.
  • the comparison result shows that two responses match each other
  • authentication is successful and the information processing device 20 transmits the authentication result to the communication device 40 (step S 309 ).
  • the communication device 40 starts processing (step S 310 ).
  • the processing performed by the communication device 40 may include reading and writing of the data contained in the information processing device 20 .
  • authentication is unsuccessful.
  • the information processing device 20 is an example of the first device
  • the communication device 40 is an example of the second device. Further, the second device determines whether the newly generated challenge matches the generated challenge or not.
  • the information processing device 20 may check the challenge, instead of the communication device 40 .
  • the storage unit 23 of the information processing device 20 stores the challenges which have been previously generated by the information processing device 20 . Since the generated challenges stored in the storage unit 23 are the challenges previously generated by the information processing device 20 , the generated challenge may optionally not be stored associated with the ID of the information processing device 20 .
  • the information processing device 20 checks the challenge after it generates the challenge, and transmits the challenge outputted as an unused challenge to the communication device 40 . Then, the communication device 40 generates a response by using the unused challenge, and transmits the generated response to the information processing device 20 . After that, the information processing device 20 performs authentication by using the response received from the communication device 40 and the comparison response generated by the information processing device 20 .
  • the information processing device 20 is an example of the first device
  • the communication device 40 is an example of the second device. Further, the first device determines whether the newly generated challenge matches the generated challenge or not.
  • challenge and response may be transmitted and received via the relay device 30 similar to the second embodiment.
  • the information processing device 20 transmits the challenge to the communication device 40 via the relay device 30 , and the communication device 40 generates a response by using the unused challenge after it checks the challenge. Then, the communication device 40 transmit the response to the information processing device 20 via the relay device 30 , and the information processing device 20 performs authentication on the basis of the response received from the communication device 40 and the comparison response generated by the information processing device 20 .
  • the contactless communication unit 31 of the relay device 30 serves as a relay challenge receiving unit and a relay response transmitting unit
  • the communication unit 35 of the relay device 30 serves as a relay challenge transmitting unit and a relay response receiving unit.
  • the relay device 30 may store the challenges and transmit the response generated by using the challenge to the information processing device 20 so that the authentication of the relay device 30 is performed.
  • the information processing device 20 may check the challenge.
  • the storage unit 23 of the information processing device 20 stores the challenges previously generated by the authentication device 10 .
  • the authentication device 10 transmits the generated challenge to the information processing device 20 , and the information processing device 20 generates a response by using the unused challenge after it checks the challenge. Then, the information processing device 20 transmits the response to the authentication device 10 , and the authentication device 10 performs authentication on the basis of the response received from the information processing device 20 and the comparison response generated by the authentication device 10 .
  • the authentication device 10 is an example of the first device
  • the information processing device 20 is an example of the second device. Then, the second device determines whether the newly generated challenge matches the generated challenge or not.
  • the authentication protocol used in the authentication system is not limited to the challenge-response authentication protocol based on the PUF, and may be a method of generating a response from the challenge by using a predetermined authentication algorithm.

Abstract

A device includes a storage unit that stores generated challenges which are challenges previously generated, a determination unit that determines whether a newly generated challenge matches any of the generated challenges or not, an output unit that outputs the newly generated challenge as an unused challenge when the determination unit determines that the newly generated challenge does not match any of the generated challenges, and a registration unit that stores the newly generated challenge as a new generated challenge in the storage unit when the determination unit determines that the newly generated challenge does not match any of the generated challenges.

Description

    CROSS-REFERENCE TO RELATED PATENT APPLICATIONS
  • This application is a continuation application filed under 35 U.S.C. 111(a) claiming the benefit under 35 U.S.C. §§120 and 365(c) of PCT International Application No. PCT/JP2014/067801 filed on Jul. 3, 2014, which is based upon and claims the benefit of priority of Japanese Application No. 2013-140582, filed on Jul. 4, 2013, the entire contents of them all are hereby incorporated by reference.
  • TECHNICAL FIELD
  • The present invention relates to authentication devices and systems.
  • BACKGROUND
  • There are known authentication protocols for authentication of IC cards, IC tags and the like, in which special processing is applied to the command or data used for the authentication in order to protect information necessary for the authentication from being intercepted or wiretapped.
  • One of such authentication protocols is known as a challenge-response protocol (for example, see PTL 1). According to this authentication protocol, an information processing device to be authenticated such as an IC card or an IC tag sends an authentication request to an authentication device such as an IC reader, and the authentication device replies by sending a challenge, which is a random value, to the information processing device. The information processing device generates a response on the basis of the received challenge and a specific value being processed under an authentication algorithm, and transmits the generated response to the authentication device.
  • The authentication device also generates a response on the basis of the challenge transmitted to the information processing device and a specific value pre-registered in the authentication device, and compares the generated response with the response received from the information processing device. When the two responses match each other, authentication is successful. On the other hand, when the two responses do not match each other, authentication is unsuccessful.
  • In the above authentication protocol, the response is generated by using a one-way function or the like. Accordingly, even if only the response is leaked, it is impossible to obtain the original challenge from the response. Therefore, the above authentication protocol can achieve high security.
  • CITATION LIST Patent Literature Patent Literature 1: JP-A-H10-247140 SUMMARY OF THE INVENTION Technical Problem
  • However, if a set of challenge and response is intercepted or wiretapped, the response which is paired with the challenge is leaked. As a result, the security of authentication is compromised when the authentication device performs authentication by again generating the challenge which is the same as the challenge intercepted or wiretapped. Particularly, in the case where authentication is frequently performed, interception or wiretapping of challenge and response leads to an increased risk of improper authentication.
  • An object of the present invention is to provide a device and an authentication system which can achieve high security even if a set of challenge and response is intercepted or wiretapped.
  • Solution to Problem
  • A device that attempts to improve or solve the above problem includes a storage unit that stores generated challenges which are challenges previously generated, a determination unit that determines whether a newly generated challenge matches any of the generated challenges or not, an output unit that outputs the newly generated challenge as an unused challenge when the determination unit determines that the newly generated challenge does not match any of the generated challenges, and a registration unit that stores the newly generated challenge as a new generated challenge in the storage unit when the determination unit determines that the newly generated challenge does not match any of the generated challenges.
  • In the above device, it is preferable that the registration unit deletes the generated challenges from the storage unit when a predetermined period of time has elapsed.
  • It is possible that the above device further include a challenge generating unit that generates a challenge, the challenge generated by the challenge generating unit being the newly generated challenge, a challenge transmitting unit that transmits the unused challenge outputted from the output unit to an external device, a response receiving unit that receives a response generated by using the unused challenge from the external device, and an authentication processing unit that authenticates by using the unused challenge and the response received from the external device.
  • It is possible that the above device further include a challenge receiving unit that receives a challenge from the external device, a response generating unit that generates a response by using the unused challenge outputted from the output unit, and a response transmitting unit that transmits the response to the external device, wherein the determination unit determine whether the newly generated challenge matches any of the generated challenges or not by using the challenge received from the external device as the newly generated challenge.
  • An authentication system that solves the above problem includes a first device and a second device, the first device including a challenge generating unit that generates a challenge, a response receiving unit that receives a response, and an authentication processing unit that performs authentication by using the challenge and the response, one of the first device and the second device including a storage unit that stores generated challenges which are challenges previously generated, a determination unit that determines whether a newly generated challenge matches any of the generated challenges or not, an output unit that outputs the newly generated challenge as an unused challenge when the determination unit determines that the newly generated challenge does not match any of the generated challenges, and a registration unit that stores the newly generated challenge as a new generated challenge in the storage unit when the determination unit determines that the newly generated challenge does not match any of the generated challenges, and the second device including a response generating unit that generates the response by using the unused challenge, and a response transmitting unit that transmits the response.
  • In the above authentication system, it is preferable that the registration unit deletes the generated challenges from the storage unit when a predetermined period of time has elapsed.
  • In the above authentication system, it is possible that the second device includes a physical unclonable function (PUF), the response generating unit generates the response on the basis of the PUF by using the unused challenge, the first device includes a storage unit that stores PUF information which represents a property of the PUF contained in the second device, and the authentication processing unit performs authentication by using the unused challenge, the PUF information, and the response received from the second device.
  • In the above authentication system, it is possible that the first device includes a PUF, the authentication processing unit performs the authentication on the basis of the PUF, the second device includes a storage unit that stores PUF information which represents a property of the PUF contained in the first device, and the response generating unit generates the response by using the unused challenge and the PUF information.
  • It is preferable that the above authentication system further include a relay device, the relay device include a relay challenge receiving unit that receives the challenge from the first device, a relay challenge transmitting unit that transmits the challenge received by the relay challenge receiving unit to the second device, a relay response receiving unit that receives the response from the second device, and a relay response transmitting unit that transmits the response received by the relay response receiving unit to the first device, the first device transmits the challenge to the second device via the relay device, and the second device transmits the response to the first device via the relay device.
  • In the above authentication system, it is preferable that the relay device includes a PUF, a storage unit that stores the challenge received from the first device, and a relay response generating unit that generates a response on the basis of the PUF contained in the relay device by using the unused challenge, the relay response transmitting unit transmits the response received from the second device and the response generated by the relay response generating unit to the first device, and the authentication processing unit of the first device performs authentication by using the unused challenge, the response generated by the response generating unit of the second device, and the response generated by the relay response generating unit of the relay device.
  • Advantageous Effects of Invention
  • According to the present invention, a higher security can be achieved in the challenge-response authentication even if a set of challenge and response is intercepted or wiretapped.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a configuration diagram which shows an example of configuration of an authentication system according to a first embodiment.
  • FIG. 2 is a configuration diagram which shows an example of configuration of an authentication device in the authentication system according to the first embodiment.
  • FIG. 3 is a view which shows an example of data configuration of a generated challenge which is stored in the authentication device according to the first embodiment.
  • FIG. 4 is a view which shows an example of data configuration of PUF information which is stored in the authentication device according to the first embodiment.
  • FIG. 5 is a configuration diagram which shows an example of configuration of an information processing device in the authentication system according to the first embodiment.
  • FIG. 6 is a sequence diagram which shows an example of authentication procedure in the authentication system according to the first embodiment.
  • FIG. 7 is a configuration diagram which shows an example of configuration of the authentication system according to a second embodiment.
  • FIG. 8 is a configuration diagram which shows an example of configuration of an authentication device in the authentication system according to the second embodiment.
  • FIG. 9 is a configuration diagram which shows an example of configuration of a relay device in the authentication system according to the second embodiment.
  • FIG. 10 is a sequence diagram which shows an example of authentication procedure in the authentication system according to the second embodiment.
  • FIG. 11 is a configuration diagram which shows an example of a communication device in the authentication system according to a third embodiment.
  • FIG. 12 is a configuration diagram which shows an example of configuration of the information processing device in the authentication system according to the third embodiment.
  • FIG. 13 is a sequence diagram which shows an example of authentication procedure in the authentication system according to the third embodiment.
  • DESCRIPTION OF REPRESENTATIVE EMBODIMENTS First Embodiment
  • With reference to the drawings, a first embodiment will be described.
  • As shown in FIG. 1, an authentication system includes an authentication device 10 and an information processing device 20. One example of the authentication device 10 is an IC reader/writer, and one example of the information processing device 20 is an IC tag.
  • As shown in FIG. 2, the authentication device 10 includes a contactless communication unit 11, a control unit 12, a storage unit 13, a PUF authentication processing unit 14 which is an example of authentication processing unit, and a challenge generating unit 15.
  • In the first embodiment, an example which uses a challenge-response authentication protocol using a physical unclonable function (PUF) will be described. A PUF is a function that extracts a difference in physical properties of ICs and reflects it to the output. The properties of ICs extracted by the PUF are physical properties which are different due to variation incurred during manufacturing of ICs, and are unclonable since they are unique to each IC. A PUF can be used for identification of ICs.
  • Specifically, a PUF circuit which is a specific circuit that outputs a value unique to each IC is provided in the ICs so that the output value from the PUF circuit is used for identification of ICs. For example, a delay time difference measurable arbiter PUF that generates a response based on the delay time difference between the signals generated in the PUF circuit is used.
  • The contactless communication unit 11 has a function as an interface for contactless communication between the authentication device 10 and the information processing device 20, and serves as a challenge transmitting unit and a response receiving unit.
  • The control unit 12 controls communication and information processing, and serves as a determination unit, a registration unit and an output unit.
  • The challenge generating unit 15 generates a challenge used for authentication. A challenge, which is typically a random number, varies at each time of generation. When a 32-bit challenge is used for authentication, approximately 4,300 million random numbers may be generated as a challenge by the challenge generating unit 15.
  • The storage unit 13 stores the challenges which have been previously generated by the challenge generating unit 15. As shown in FIG. 3, the challenges previously generated by the challenge generating unit 15 may be stored associated with each ID of the information processing device 20 which is a transmission destination of the challenge. The ID of the information processing device 20 is identification information of the information processing device 20, which is uniquely allocated to each information processing device 20.
  • Further, when the challenge-response authentication protocol based on the PUF is used, the storage unit 13 stores the IDs of the information processing devices 20 and parameters which represent correlation between input data and output data of the PUF circuits in the information processing devices 20, both being associated with each other as shown in FIG. 4. The parameter is an example of PUF information that indicates the properties of the PUF.
  • The PUF authentication processing unit 14 serves as a comparison response generating unit. Specifically, on receiving a response from the information processing device 20, the PUF authentication processing unit 14 reads out the parameter associated with the ID of the information processing device 20 from the storage unit 13, and generates a comparison response on the basis of the challenge transmitted to the information processing device 20 and the parameter read out from the storage unit 13. Then, the PUF authentication processing unit 14 compares the generated comparison response and the response received from the information processing device 20, and determines whether the comparison response matches the received response.
  • When the comparison result shows that two responses match each other, authentication is successful and the authentication device 10 can start processing. The processing performed by the authentication device 10 may include reading and writing of the data possessed by the information processing device 20. Specifically, management of IDs, money and points are performed. When the comparison result shows that two responses do not match each other, authentication is unsuccessful. Furthermore, if the matching rate of two responses is at least a predetermined threshold, the PUF authentication processing unit 14 may determine that two responses match each other.
  • The authentication device 10 is not limited to an IC reader/writer, and may be a mobile terminal such as smartphone and tablet computer, or an installation type device.
  • Alternatively, the authentication device 10 may perform contact communication with the information processing device 20. In this case, instead of the contactless communication unit 11, or in addition to the contactless communication unit 11, a contact communication unit as an interface for contact communication can be provided in the authentication device 10.
  • As shown in FIG. 5, the information processing device 20 includes a contactless communication unit 21, a control unit 22, a storage unit 23 and a PUF circuit 24, which is described above.
  • The contactless communication unit 21 has a function as an interface for contactless communication between the information processing device 20 and the authentication device 10, and serves as a challenge receiving unit and a response transmitting unit.
  • The control unit 22 controls communication and information processing, and serves as a response generating unit.
  • The storage unit 23 stores the data such as the IDs of the aforementioned information processing devices 20.
  • As described above, the PUF circuit 24 outputs an output value which is unique to each information processing device 20. The output value can be used for identification of ICs, and thus identification of the information processing devices 20.
  • The information processing device 20 is not limited to an IC tag, but may also be a mobile terminal such as IC card, smartphone which carries an IC, cell phone, and tablet computer.
  • Alternatively, the authentication device 10 may perform contact communication with the information processing device 20. In this case, instead of the contactless communication unit 21, or in addition to the contactless communication unit 21, a contact communication unit as an interface for contact communication can be provided in the information processing device 20.
  • With reference to FIG. 6, an example of flow of information processing in the first embodiment will be described.
  • As shown in FIG. 6, the information processing device 20 is brought closer to the authentication device 10, or alternatively, the information processing device 20 is connected to the authentication device 10 to start communication (step S101). When the communication starts, the authentication device 10 requests the ID of the information processing device 20 to the information processing device 20 (step S102). The information processing device 20 transmits the ID of the information processing device 20 to the authentication device 10 in response to the request from the authentication device 10 (step S103).
  • Then, the challenge generating unit 15 of the authentication device 10 generates a challenge (step S104). The control unit 12 of the authentication device 10 checks if the generated challenge matches any of the previously generated challenges (step S105). Specifically, the authentication device 10 compares a list of previously generated challenges which are the challenges stored in the storage unit 13 with the newly generated challenge. When the comparison result shows that the newly generated challenge does not match any of the generated challenges, the control unit 12 of the authentication device 10 outputs the newly generated challenge as an unused challenge to the contactless communication unit 11 so that the contactless communication unit 11 transmits the unused challenge to the information processing device 20 (step S106). Further, the control unit 12 of the authentication device 10 adds the newly generated challenge to the list of generated challenges by allowing the storage unit 13 to store the newly generated challenge.
  • When the comparison result shows that the newly generated challenge matches any of the challenges previously generated, the process returns to step S104, in which the authentication device 10 again generates a challenge. Then, the authentication device 10 checks if the generated challenge matches any of the previously generated challenges in step S105. The authentication device 10 repeats step S104 and step S105 until a challenge which is different from the previously generated challenges is generated.
  • When checking the challenge, the authentication device 10 may compare the challenges included in the list of the generated challenges with the newly generated challenge so that it determines the newly generated challenge as an unused challenge when the newly generated challenge does not match any of the generated challenges.
  • Alternatively, the authentication device 10 may check the challenge for each ID of the information processing device 20. That is, the authentication device 10 compares the challenges associated with the ID of the information processing device 20 which is the target of the current authentication, that is, the ID the same as that received from the information processing device 20 in step S103 among the generated challenges stored in the storage unit 13, with the newly generated challenge. When the comparison result shows that any of the generated challenges does not match the newly generated challenge, the authentication device 10 determines the newly generated challenge as an unused challenge even if any of the generated challenges associated with the ID of another information processing device 20 matches the newly generated challenge.
  • It is possible to achieve higher security in a configuration in which the challenges in the list of generated challenges are compared with the newly generated challenge.
  • When there is no unused challenge, or when a predetermined period of time has elapsed, the authentication device 10 may delete the generated challenge stored in the storage unit 13. For example, in the case where an expected usage life of the IC tag as the information processing device 20 is one year, the control unit 12 of the authentication device 10 deletes the challenge from the storage unit 13 when one year has elapsed from the generation of the challenge. Further, a starting point of the predetermined period of time is not only the time of generation of the challenge, but may be defined as appropriate.
  • When the contactless communication unit 21 of the information processing device 20 receives the challenge from the authentication device 10, the control unit 22 of the information processing device 20 generates a response by using the received challenge (step S107). When the authentication protocol based on PUF is used, the information processing device 20 generates a response by using an output value from the PUF circuit 24 which uses the received challenge as an input value.
  • The response generated by the information processing device 20 is transmitted from the contactless communication unit 21 of the information processing device 20 to the authentication device 10 (step S108).
  • The PUF authentication processing unit 14 of the authentication device 10 performs authentication by using the response received from the information processing device 20 via the contactless communication unit 11 of the authentication device 10 (step S109). Specifically, the storage unit 13 of the authentication device 10 generates a comparison response on the basis of the parameter of PUF which is stored associated with the ID the same as the ID received from the information processing device 20 at step S103 and the challenge transmitted to the information processing device 20. Then, the authentication device 10 compares the generated comparison response and the response received from the information processing device 20, and determines whether the comparison response matches the received response or not.
  • When the comparison result shows that two responses match each other, authentication is successful and the authentication device 10 starts processing (step S110). When the comparison result shows that two responses do not match each other, authentication is unsuccessful.
  • According to the aforementioned configuration, it is possible to achieve high security even if a set of the used challenge and response is intercepted or wiretapped since a challenge which has been used for authentication is prevented from being used again for authentication.
  • In the above example of information processing, an example is described in which the authentication device 10 authenticates the information processing device 20. However, so-called mutual authentication is also possible in which the information processing device 20 also authenticates the authentication device 10. The method of authenticating the authentication device 10 by the information processing device 20 may be a known method.
  • In the first embodiment, the authentication device 10 is an example of the first device and the information processing device 20 is an example of the second device. Further, the first device determines whether the newly generated challenge matches the generated challenge or not.
  • Second Embodiment
  • With reference to the drawings, a second embodiment will be described. The same elements as those of the first embodiment are denoted by the same reference characters, and the description thereof is omitted.
  • As shown in FIG. 7, the authentication system includes the authentication device 10, the information processing device 20 and a relay device 30. One example of the authentication device 10 is a server, one example of the information processing device 20 is an IC tag, and one example of the relay device 30 is an IC reader/writer. The authentication device 10 and the relay device 30 are connected to a network NW such as Internet.
  • In the authentication system according to the second embodiment, the authentication device 10 transmits one challenge to the relay device 30, and the relay device 30 can transmit the challenge to a plurality of information processing devices 20. Accordingly, the authentication device 10 can apply one challenge to a plurality of information processing devices 20 without generating a challenge for each of the information processing devices 20.
  • As shown in FIG. 8, the authentication device 10 includes a communication unit 16, the control unit 12 having the same configuration as that of the first embodiment, the storage unit 13, the PUF authentication processing unit 14 which is an example of authentication processing unit, and the challenge generating unit 15. Also in the second embodiment, an example in which the challenge-response authentication protocol using a PUF will be described. Only the information processing device 20 may have the PUF, or alternatively, both the information processing device 20 and the relay device 30 may have the PUF.
  • The communication unit 16 has a function as an interface for communication between the authentication device 10 and the relay device 30, and serves as a challenge transmitting unit and a response receiving unit.
  • The control unit 12 controls communication and information processing, and serves as a determination unit, a registration unit and an output unit.
  • The challenge generating unit 15 generates a challenge used for authentication.
  • The storage unit 13 stores the challenges which have been previously generated by the challenge generating unit 15. The challenges previously generated by the challenge generating unit 15 may be stored associated with each ID of the information processing device 20 which is a transmission destination of the challenge. Further, the challenges previously generated by the challenge generating unit 15 may be stored associated with each ID of the relay device 30 which is a transmission destination of the challenge. The ID of the relay device 30 is identification information of the relay device 30, which is uniquely allocated to each relay device 30.
  • Further, when the challenge-response authentication protocol based on the PUF of the information processing device 20 is used, the storage unit 13 stores the IDs of the information processing devices 20 and parameters which represent properties of the PUF of the information processing devices 20, both being associated with each other.
  • The PUF authentication processing unit 14 serves as a comparison response generating unit. Specifically, on receiving a response from the information processing device 20 via the relay device 30, the PUF authentication processing unit 14 reads out the parameter associated with the ID of the information processing device 20 from the storage unit 13, and generates a comparison response on the basis of the challenge transmitted to the information processing device 20 via the relay device 30 and the parameter read out from the storage unit 13. Then, the PUF authentication processing unit 14 compares the generated comparison response and the response received from the information processing device 20 via the relay device 30, and determines whether the comparison response matches the received response.
  • When the comparison result shows that two responses match each other, authentication is successful. On the other hand, when the comparison result shows that two responses do not match each other, authentication is unsuccessful. Furthermore, if the matching rate of two responses is at least a predetermined threshold, the PUF authentication processing unit 14 may determine that two responses match each other.
  • When the authentication protocol using the PUF of the relay device 30 in addition to the PUF of the information processing device 20 is used, the storage unit 13 stores the ID of the relay device 30 and parameters which represent properties of the PUF of the relay device 30, both being associated with each other.
  • On receiving a response from the relay device 30, the PUF authentication processing unit 14 reads out the parameter associated with the ID of the relay device 30 from the storage unit 13, and generates a comparison response on the basis of the challenge transmitted to the relay device 30 and the parameter read out from the storage unit 13. Then, the PUF authentication processing unit 14 compares the generated comparison response and the response received from the relay device 30, and determines whether the comparison response matches the received response.
  • When the comparison result shows that two responses match each other, authentication is successful. On the other hand, when the comparison result shows that two responses do not match each other, authentication is unsuccessful. Furthermore, if the matching rate of two responses is at least a predetermined threshold, the PUF authentication processing unit 14 may determine that two responses match each other.
  • The authentication device 10 is not limited to a server, and may be a mobile terminal such as smartphone and tablet computer.
  • The information processing device 20 has the same configuration as that of the information processing device 20 of the first embodiment shown in FIG. 5 except that the contactless communication unit 21 performs contactless communication with the relay device 30. In addition, the relay device 30 may perform contact communication with the information processing device 20. In this case, the information processing device 20 includes a contact communication unit.
  • As shown in FIG. 9, the relay device 30 includes a contactless communication unit 31, a control unit 32, a storage unit 33, a PUF circuit 34, and a communication unit 35.
  • The contactless communication unit 31 has a function as an interface for contactless communication between the relay device 30 and the information processing device 20, and serves as a relay challenge transmitting unit and a relay response receiving unit.
  • The control unit 32 controls communication and information processing, and serves as a relay response generating unit.
  • The storage unit 33 stores the data such as the IDs of the aforementioned relay device 30.
  • As described above, the PUF circuit 34 outputs an output value which is unique to each relay device 30. The output value can be used for identification of ICs, and thus identification of the relay devices 30. Authentication of the relay device 30 can be performed by using the authentication protocol using the PUF of the relay device 30. Specifically, if an improper relay device 30 is used, it is possible to detect that the relay device 30 is improper. Furthermore, when authentication of the relay device 30 using the PUF is not performed, the PUF circuit 34 may not be provided in the relay device 30.
  • The communication unit 35 has a function as an interface for communication between the relay device 30 and the authentication device 10, and serves as a relay challenge receiving unit and a relay response transmitting unit.
  • The relay device 30 is not limited to an IC reader/writer, and may be a mobile terminal such as smartphone and tablet computer, or an installation type device.
  • Alternatively, the relay device 30 may perform contact communication with the information processing device 20. In this case, instead of the contactless communication unit 31, or in addition to the contactless communication unit 31, a contact communication unit as an interface for contact communication can be provided in the relay device 30.
  • With reference to FIG. 10, an example of flow of information processing in the second embodiment will be described.
  • As shown in FIG. 10, the information processing device 20 is brought closer to the relay device 30, or alternatively, the information processing device 20 is connected to the relay device 30 to start communication (step S201). When the communication starts, the relay device 30 requests the ID of the information processing device 20 to the information processing device 20 (step S202). The information processing device 20 transmits the ID of the information processing device 20 to the relay device 30 in response to the request from the relay device 30 (step S203).
  • Then, the relay device 30 transmits the ID of the information processing device 20 received from the information processing device 20 and the ID of the relay device 30 to the authentication device 10 (step S204). If there are a plurality of information processing devices 20, step S201 to step S204 are repeated for the number of information processing devices 20.
  • Then, the challenge generating unit 15 of the authentication device 10 generates a challenge (step S205). The control unit 12 of the authentication device 10 checks if the generated challenge matches any of the previously generated challenges (step S206). Specifically, the authentication device 10 compares a list of previously generated challenges which are the challenges stored in the storage unit 13 with the newly generated challenge. When the comparison result shows that the newly generated challenge does not match any of the generated challenges, the control unit 12 of the authentication device 10 outputs the newly generated challenge as an unused challenge to the communication unit 16 so that the communication unit 16 transmits the unused challenge to the relay device 30 (step S207). Further, the control unit 12 of the authentication device 10 adds the newly generated challenge to the list of generated challenges by allowing the storage unit 13 to store the newly generated challenge.
  • When the comparison result shows that the newly generated challenge matches any of the challenges previously generated, the process returns to step S205, in which the authentication device 10 again generates a challenge. Then, the authentication device 10 checks if the generated challenge matches any of the previously generated challenges in step S206. The authentication device 10 repeats step S205 and step S206 until a challenge which is different from the previously generated challenges is generated.
  • When checking the challenge, the authentication device 10 may compare the challenges included in the list of the generated challenges with the newly generated challenge. The authentication device 10 may check the challenge for each ID of the information processing device 20 or each ID of the relay device 30. It is possible to achieve higher security in a configuration in which the challenges in the list of generated challenges is compared with the newly generated challenge.
  • When there is no unused challenge, or when a predetermined period of time has elapsed, the authentication device 10 may delete the generated challenge stored in the storage unit 13. For example, in the case where an expected usage life of the IC tag as the information processing device 20 is one year, the control unit 12 of the authentication device 10 deletes the challenge from the storage unit 13 when one year has elapsed from the generation of the challenge. Further, a starting point of the predetermined period of time is not only the time of generation of the challenge, but may be defined as appropriate.
  • When the communication unit 35 of the relay device 30 receives the challenge from the authentication device 10, the relay device 30 stores the challenge by allowing the storage unit 33 to store the received challenge (step S208). Then, the contactless communication unit 31 of the relay device 30 transmits the challenge received from the authentication device 10 to the information processing device 20 (step S209). If there are a plurality of information processing devices 20, the relay device 30 transmits the challenge to each of the information processing devices 20.
  • When the contactless communication unit 21 of the information processing device 20 receives the challenge from the relay device 30, the control unit 22 of the information processing device 20 generates a response by using the received challenge (step S210). When the authentication protocol based on PUF is used, the information processing device 20 generates a response by using an output value from the PUF circuit 24 which uses the received challenge as an input value.
  • The response generated by the information processing device 20 is transmitted from the contactless communication unit 21 of the information processing device 20 to the relay device 30 The response generated by the information processing device 20 is transmitted from the contactless communication unit 21 of the information processing device 20 to the (step S211). If there are a plurality of information processing devices 20, each of the information processing devices 20 generate the response and transmit it to the relay device 30.
  • Then, the control unit 32 of the relay device 30 generates a response by using the challenge stored in step S208 (step S212). When the authentication of the relay device 30 by using the PUF is performed, the relay device 30 generates a response by using an output value from the PUF circuit 34 which uses the received challenge as an input value.
  • The communication unit 35 of the relay device 30 transmits the response generated by the information processing device 20 and the response generated by the relay device 30 to the authentication device 10 (step S213).
  • The PUF authentication processing unit 14 of the authentication device 10 performs authentication by using two responses that the communication unit 16 of the authentication device 10 has received from the relay device 30 (step S214). Specifically, the storage unit 13 of the authentication device 10 generates a comparison response on the basis of the parameter of PUF which is stored associated with the ID the same as the ID of the information processing device 20 received at step S204 and the challenge transmitted to the information processing device 20. Then, the authentication device 10 compares the generated comparison response and the response generated by the information processing device 20, and determines whether the comparison response matches the response generated by the information processing device 20 or not.
  • The storage unit 13 of the authentication device 10 generates a comparison response on the basis of the parameter of PUF which is stored associated with the ID the same as the ID of the relay device 30 received at step S204 and the challenge transmitted to the relay device 30. Then, the authentication device 10 compares the generated comparison response and the response generated by the relay device 30, and determines whether the comparison response matches the response generated by the relay device 30 or not.
  • When the comparison result shows that both responses match the comparison response, authentication is successful and the authentication device 10 transmits the authentication result to the relay device 30 (step S215). Then, the relay device 30 starts processing (step S216). The processing performed by the relay device 30 may include reading and writing of the data contained in the information processing device 20.
  • When the comparison result shows that one or both of the responses do not match the comparison response, authentication is unsuccessful.
  • According to the aforementioned configuration, it is possible to achieve high security even if a set of the used challenge and response is intercepted or wiretapped since a challenge which has been used for authentication is prevented from being used again for authentication.
  • In the above example of information processing, an example is described in which the authentication of the relay device 30 is performed, that is, the relay device 30 generates a response. However, the relay device 30 may not generate a response and the authentication of the relay device 30 may not be performed. In this case, authentication is performed by using only the response generated by the information processing device 20. Nonetheless, it is possible to achieve higher security in a configuration in which the authentication of the relay device 30 is performed since the use of improper relay device 30 can be prevented.
  • In the above example of information processing, an example is described in which the authentication device 10 authenticates the relay device 30 and the information processing device 20 at the same time. However, the authentication procedure by the authentication device 10 is not limited to that. For example, the authentication device 10 may first perform authentication of the relay device 30, and then perform authentication of the information processing device 20 when the authentication of the relay device 30 is successful.
  • Further, in the above example of information processing, an example is described in which the authentication device 10 authenticates both the relay device 30 and the information processing device 20. However, so-called mutual authentication is also possible in which the relay device 30 and the information processing device 20 also authenticates the authentication device 10. Authentication method performed by the relay device 30 and the information processing device 20 to authenticate the authentication device 10 may be a known method.
  • In the second embodiment, the authentication device 10 is an example of the first device and the information processing device 20 is an example of the second device. Further, the first device determines whether the newly generated challenge matches the generated challenge or not.
  • Third Embodiment
  • With reference to the drawings, a third embodiment will be described focusing on the difference from the first embodiment. The same elements as those of the first embodiment are denoted by the same reference characters, and the description thereof is omitted.
  • Similar to the first embodiment, the authentication system of the third embodiment includes a communication device 40 which is an IC reader/writer and the information processing device 20 such as an IC tag. Also in the third embodiment, an example which uses a challenge-response authentication protocol using a PUF will be described.
  • As shown in FIG. 11, the communication device 40 includes a contactless communication unit 41, a control unit 42, and a storage unit 43.
  • The contactless communication unit 41 has a function as an interface for contactless communication between the communication device 40 and the information processing device 20, and serves as a challenge receiving unit and a response transmitting unit.
  • The control unit 42 controls communication and information processing, and serves as a determination unit, a registration unit, an output unit, and a response generating unit.
  • The storage unit 43 stores the challenges that the communication device 40 has received from the information processing device 20, that is, the challenges which have been previously generated by the information processing device 20. The challenges which have been previously generated by the information processing device 20 may be stored associated with each ID of the information processing device 20 which has generated the challenge. When the challenge-response authentication protocol based on the PUF is used, the storage unit 43 stores the IDs of the information processing devices 20 and parameters which represent properties of the PUF of the information processing devices 20, both being associated with each other.
  • The communication device 40 is not limited to an IC reader/writer, and may be a mobile terminal such as smartphone and tablet computer, or an installation type device.
  • Alternatively, the communication device 40 may perform contact communication with the information processing device 20. In this case, instead of the contactless communication unit 41, or in addition to the contactless communication unit 41, a contact communication unit as an interface for contact communication can be provided in the communication device 40.
  • As shown in FIG. 12, the information processing device 20 includes the contactless communication unit 21, the control unit 22, the storage unit 23, the PUF circuit 24, a PUF authentication processing unit 25 which is an example of authentication processing unit, and a challenge generating unit 26.
  • The contactless communication unit 21 has a function as an interface for contactless communication between the information processing device 20 and the communication device 40, and serves as a challenge transmitting unit and a response receiving unit.
  • The control unit 22 controls communication and information processing.
  • The storage unit 23 stores the data such as the IDs of the information processing devices 20.
  • The PUF circuit 24 outputs an output value which is unique to each information processing device 20.
  • The challenge generating unit 26 generates a challenge used for authentication.
  • The PUF authentication processing unit 25 serves as a comparison response generating unit, and generates a comparison response on the basis of the challenge transmitted to the communication device 40 by using the PUF circuit 24. The PUF authentication processing unit 25 compares the generated comparison response and the response received from the communication device 40, and determines whether the comparison response matches the received response.
  • When the comparison result shows that two responses match each other, authentication is successful. On the other hand, when the comparison result shows that two responses do not match each other, authentication is unsuccessful. Furthermore, if the matching rate of two responses is at least a predetermined threshold, the PUF authentication processing unit 25 may determine that two responses match each other.
  • The information processing device 20 is not limited to an IC tag, and may be a mobile terminal such as IC card, smartphone which carries an IC, cell phone, and tablet computer.
  • Alternatively, the communication device 40 may perform contact communication with the information processing device 20. In this case, instead of the contactless communication unit 21, or in addition to the contactless communication unit 21, a contact communication unit as an interface for contact communication can be provided in the information processing device 20.
  • With reference to FIG. 13, an example of flow of information processing in the third embodiment will be described.
  • As shown in FIG. 13, the information processing device 20 is brought closer to the communication device 40, or alternatively, the information processing device 20 is connected to the communication device 40 to start communication (step S301). When the communication starts, the communication device 40 requests the information processing device 20 to transmit an ID of the information processing device 20 and a challenge (step S302).
  • In response to the request from the communication device 40, the challenge generating unit 26 of the information processing device 20 generates a challenge (step S303). The contactless communication unit 21 of the information processing device 20 transmits the generated challenge and the ID of the information processing device 20 to the communication device 40 (step S304).
  • Then, the control unit 42 of the communication device 40 checks if the challenge that the contactless communication unit 41 of the communication device 40 has received from the information processing device 20 matches any of the previously generated challenges (step S305). Specifically, the communication device 40 compares a list of previously generated challenges which are the challenges stored in the storage unit 43 with the newly generated challenge at the information processing device 20. When the comparison result shows that the newly generated challenge does not match any of the generated challenges, the control unit 42 of the communication device 40 outputs the newly generated challenge as an unused challenge. Further, the control unit 42 of the communication device 40 adds the newly generated challenge to the list of generated challenges by allowing the storage unit 13 to store the newly generated challenge.
  • When the comparison result shows that the newly generated challenge matches any of the challenges previously generated, the process returns to step S302, in which the communication device 40 again requests the information processing device 20 to transmit the challenge. Then, the information processing device 20 repeats generation of a challenge, and the communication device 40 repeats checking of the challenge. Accordingly, step S302 to step S305 are repeated until a challenge which is different from the previously generated challenges is generated.
  • When checking the challenge, the communication device 40 may compare the challenges included in the list of the generated challenges with the newly generated challenge, or alternatively, the communication device 40 may compare the challenges for each ID of the information processing device 20.
  • When there is no unused challenge, or when a predetermined period of time has elapsed, the communication device 40 may delete the generated challenge stored in the storage unit 43. For example, in the case where an expected usage life of the IC tag as the information processing device 20 is one year, the control unit 42 of the communication device 40 deletes the challenge from the storage unit 43 when one year has elapsed from the generation of the challenge. Further, a starting point of the predetermined period of time is not only the time of generation of the challenge, but may be defined as appropriate.
  • Then, the control unit 42 of the communication device 40 generates a response by using the unused challenge (step S306). Specifically, the storage unit 43 of the communication device 40 generates a response on the basis of the parameter of PUF which is stored associated with the ID the same as the ID of the information processing device 20 received at step S304 and the unused challenge. Then, the contactless communication unit 41 of the communication device 40 transmits the generated response to the information processing device 20 (step S307).
  • Then, the PUF authentication processing unit 25 of the information processing device 20 performs authentication by using the response that the contactless communication unit 21 of the information processing device 20 received from the communication device 40 (step S308). Specifically, the information processing device 20 generates a comparison response by using the challenge transmitted to the communication device 40. When the authentication protocol based on PUF is used, the information processing device 20 generates a comparison response by using an output value from the PUF circuit 24 which is obtained by using the challenge transmitted to the communication device 40 as an input value. Then, the information processing device 20 compares the comparison response and the response received from the communication device 40, and determines whether the comparison response matches the received response or not.
  • When the comparison result shows that two responses match each other, authentication is successful and the information processing device 20 transmits the authentication result to the communication device 40 (step S309). Then, the communication device 40 starts processing (step S310). The processing performed by the communication device 40 may include reading and writing of the data contained in the information processing device 20. When the comparison result shows that two responses do not match each other, authentication is unsuccessful.
  • According to the aforementioned configuration, it is possible to achieve high security even if a set of the used challenge and response is intercepted or wiretapped since a challenge which has been used for authentication is prevented from being used again for authentication.
  • In the above example of information processing, an example is described in which the information processing device 20 performs authentication. However, mutual authentication is also possible in which the communication device 40 performs authentication.
  • In the third embodiment, the information processing device 20 is an example of the first device, and the communication device 40 is an example of the second device. Further, the second device determines whether the newly generated challenge matches the generated challenge or not.
  • Modification Examples
  • The above embodiment may be modified as described below.
  • In the third embodiment, the information processing device 20 may check the challenge, instead of the communication device 40. In this case, the storage unit 23 of the information processing device 20 stores the challenges which have been previously generated by the information processing device 20. Since the generated challenges stored in the storage unit 23 are the challenges previously generated by the information processing device 20, the generated challenge may optionally not be stored associated with the ID of the information processing device 20. In this embodiment, the information processing device 20 checks the challenge after it generates the challenge, and transmits the challenge outputted as an unused challenge to the communication device 40. Then, the communication device 40 generates a response by using the unused challenge, and transmits the generated response to the information processing device 20. After that, the information processing device 20 performs authentication by using the response received from the communication device 40 and the comparison response generated by the information processing device 20.
  • In this embodiment, the information processing device 20 is an example of the first device, and the communication device 40 is an example of the second device. Further, the first device determines whether the newly generated challenge matches the generated challenge or not.
  • In the third embodiment and the modified example of the third embodiment, challenge and response may be transmitted and received via the relay device 30 similar to the second embodiment. For example, in the third embodiment, the information processing device 20 transmits the challenge to the communication device 40 via the relay device 30, and the communication device 40 generates a response by using the unused challenge after it checks the challenge. Then, the communication device 40 transmit the response to the information processing device 20 via the relay device 30, and the information processing device 20 performs authentication on the basis of the response received from the communication device 40 and the comparison response generated by the information processing device 20. In this case, the contactless communication unit 31 of the relay device 30 serves as a relay challenge receiving unit and a relay response transmitting unit, and the communication unit 35 of the relay device 30 serves as a relay challenge transmitting unit and a relay response receiving unit. In this embodiment, the relay device 30 may store the challenges and transmit the response generated by using the challenge to the information processing device 20 so that the authentication of the relay device 30 is performed.
  • In the first embodiment and the second embodiment, the information processing device 20 may check the challenge. In this case, the storage unit 23 of the information processing device 20 stores the challenges previously generated by the authentication device 10. For example, in the first embodiment, the authentication device 10 transmits the generated challenge to the information processing device 20, and the information processing device 20 generates a response by using the unused challenge after it checks the challenge. Then, the information processing device 20 transmits the response to the authentication device 10, and the authentication device 10 performs authentication on the basis of the response received from the information processing device 20 and the comparison response generated by the authentication device 10.
  • In this embodiment, the authentication device 10 is an example of the first device, and the information processing device 20 is an example of the second device. Then, the second device determines whether the newly generated challenge matches the generated challenge or not.
  • The authentication protocol used in the authentication system is not limited to the challenge-response authentication protocol based on the PUF, and may be a method of generating a response from the challenge by using a predetermined authentication algorithm.
  • REFERENCE SIGNS LIST
  • 10 authentication device, 11 contactless communication unit, 12 control unit, 13 storage unit, 14 PUF authentication processing unit, 15 challenge generating unit, 16 communication unit, 20 information processing device, 21 contactless communication unit, 22 control unit, 23 storage unit, 24 PUF circuit, 25 PUF authentication processing unit, 26 challenge generating unit, 30 relay device, 31 contactless communication unit, 32 control unit, 33 storage unit, 34 PUF circuit, 35 communication unit, 40 communication device, 41 contactless communication unit, 42 control unit, 43 storage unit

Claims (10)

What is claimed is:
1. A device comprising:
a storage unit that stores generated challenges which are challenges previously generated;
a determination unit that determines whether a newly generated challenge matches any of the generated challenges or not;
an output unit that outputs the newly generated challenge as an unused challenge when the determination unit determines that the newly generated challenge does not match any of the generated challenges; and
a registration unit that stores the newly generated challenge as a new generated challenge in the storage unit when the determination unit determines that the newly generated challenge does not match any of the generated challenges.
2. The device of claim 1, wherein the registration unit deletes the generated challenges from the storage unit when a predetermined period of time has elapsed.
3. The device of claim 1, further comprising:
a challenge generating unit that generates a challenge, the challenge generated by the challenge generating unit being the newly generated challenge;
a challenge transmitting unit that transmits the unused challenge outputted from the output unit to an external device;
a response receiving unit that receives a response generated by using the unused challenge from the external device; and
an authentication processing unit that authenticates by using the unused challenge and the response received from the external device.
4. The device of claim 1, further comprising:
a challenge receiving unit that receives a challenge from the external device;
a response generating unit that generates a response by using the unused challenge outputted from the output unit; and
a response transmitting unit that transmits the response to the external device, wherein
the determination unit determines whether the newly generated challenge matches any of the generated challenges or not by using the challenge received from the external device as the newly generated challenge.
5. An authentication system comprising a first device and a second device,
the first device including:
a challenge generating unit that generates a challenge;
a response receiving unit that receives a response; and
an authentication processing unit that performs authentication by using the challenge and the response,
one of the first device and the second device including:
a storage unit that stores generated challenges which are challenges previously generated;
a determination unit that determines whether a newly generated challenge matches any of the generated challenges or not;
an output unit that outputs the newly generated challenge as an unused challenge when the determination unit determines that the newly generated challenge does not match any of the generated challenges; and
a registration unit that stores the newly generated challenge as a new generated challenge in the storage unit when the determination unit determines that the newly generated challenge does not match any of the generated challenges, and
the second device including:
a response generating unit that generates the response by using the unused challenge; and
a response transmitting unit that transmits the response.
6. The authentication system of claim 5, wherein the registration unit deletes the generated challenges from the storage unit when a predetermined period of time has elapsed.
7. The authentication system of claim 5, wherein
the second device includes a PUF,
the response generating unit generates the response on the basis of the PUF by using the unused challenge,
the first device includes a storage unit that stores PUF information which represents a property of the PUF contained in the second device, and
the authentication processing unit performs authentication by using the unused challenge, the PUF information, and the response received from the second device.
8. The authentication system of claim 5, wherein
the first device includes a PUF,
the authentication processing unit performs the authentication on the basis of the PUF,
the second device includes a storage unit that stores PUF information which represents a property of the PUF contained in the first device, and
the response generating unit generates the response by using the unused challenge and the PUF information.
9. The authentication system of claim 5, wherein
the authentication system further includes a relay device,
the relay device includes:
a relay challenge receiving unit that receives the challenge from the first device;
a relay challenge transmitting unit that transmits the challenge received by the relay challenge receiving unit to the second device;
a relay response receiving unit that receives the response from the second device; and
a relay response transmitting unit that transmits the response received by the relay response receiving unit to the first device,
the first device transmits the challenge to the second device via the relay device, and
the second device transmits the response to the first device via the relay device.
10. The authentication system of claim 9, wherein
the relay device includes:
a PUF;
a storage unit that stores the challenge received from the first device; and
a relay response generating unit that generates a response on the basis of the PUF contained in the relay device by using the unused challenge,
the relay response transmitting unit transmits the response received from the second device and the response generated by the relay response generating unit to the first device, and
the authentication processing unit of the first device performs authentication by using the unused challenge, the response generated by the response generating unit of the second device, and the response generated by the relay response generating unit of the relay device.
US14/973,529 2013-07-04 2015-12-17 Device and authentication system Active 2034-09-04 US10057262B2 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
JP2013140582 2013-07-04
JP2013-140582 2013-07-04
PCT/JP2014/067801 WO2015002271A1 (en) 2013-07-04 2014-07-03 Device and authentication system

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2014/067801 Continuation WO2015002271A1 (en) 2013-07-04 2014-07-03 Device and authentication system

Publications (2)

Publication Number Publication Date
US20160105437A1 true US20160105437A1 (en) 2016-04-14
US10057262B2 US10057262B2 (en) 2018-08-21

Family

ID=52143840

Family Applications (1)

Application Number Title Priority Date Filing Date
US14/973,529 Active 2034-09-04 US10057262B2 (en) 2013-07-04 2015-12-17 Device and authentication system

Country Status (5)

Country Link
US (1) US10057262B2 (en)
EP (1) EP3018607B1 (en)
JP (1) JP6617556B2 (en)
CN (1) CN105324777A (en)
WO (1) WO2015002271A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180375670A1 (en) * 2017-06-21 2018-12-27 Commissariat A L'energie Atomique Et Aux Energies Alternatives Method for securing an integrated circuit during fabrication
US11429624B2 (en) * 2015-11-20 2022-08-30 Intrinsic Id B.V. Assigning device

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107493572B (en) * 2016-06-13 2021-04-02 上海复旦微电子集团股份有限公司 Wireless radio frequency equipment, authentication server and authentication method
CN107493171A (en) * 2016-06-13 2017-12-19 上海复旦微电子集团股份有限公司 Wireless radios, certificate server and authentication method
JP2018107668A (en) * 2016-12-27 2018-07-05 本田技研工業株式会社 Device to be authenticated, communication system, communication method, and program
US10521616B2 (en) 2017-11-08 2019-12-31 Analog Devices, Inc. Remote re-enrollment of physical unclonable functions
CN112286463A (en) * 2020-10-30 2021-01-29 南方电网科学研究院有限责任公司 Data processing method, device, equipment and storage medium
US20230262058A1 (en) * 2022-02-16 2023-08-17 International Business Machines Corporation Wireless power transmission signal based authentication

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100176920A1 (en) * 2007-06-14 2010-07-15 Intrinsic Id Bv Method and device for providing digital security
US20110002461A1 (en) * 2007-05-11 2011-01-06 Validity Sensors, Inc. Method and System for Electronically Securing an Electronic Biometric Device Using Physically Unclonable Functions
US7958347B1 (en) * 2005-02-04 2011-06-07 F5 Networks, Inc. Methods and apparatus for implementing authentication
US20130205370A1 (en) * 2012-02-07 2013-08-08 Avinash Kalgi Mobile human challenge-response test
US20140189828A1 (en) * 2012-12-28 2014-07-03 Davit Baghdasaryan System and method for processing random challenges within an authentication framework

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3606418B2 (en) 1997-03-04 2005-01-05 松下電器産業株式会社 Random number generator
JP3558488B2 (en) * 1997-05-20 2004-08-25 エニー株式会社 Cryptographic communication system
JP4578352B2 (en) * 2005-08-12 2010-11-10 シャープ株式会社 Communication mediating apparatus, data providing apparatus, and data providing system
JP4222403B2 (en) * 2006-10-16 2009-02-12 沖電気工業株式会社 Unauthorized terminal estimation system, unauthorized terminal estimation device, and communication terminal device
CN101542496B (en) * 2007-09-19 2012-09-05 美国威诚股份有限公司 Authentication with physical unclonable functions
JP5330026B2 (en) * 2009-02-25 2013-10-30 株式会社エヌ・ティ・ティ・ドコモ Registration request system, registration request server device, and registration request control method for server device
JP5423088B2 (en) * 2009-03-25 2014-02-19 ソニー株式会社 Integrated circuit, encryption communication device, encryption communication system, information processing method, and encryption communication method
JP5499358B2 (en) * 2010-03-24 2014-05-21 独立行政法人産業技術総合研究所 Authentication processing method and apparatus
US9195822B2 (en) * 2011-12-20 2015-11-24 Visa International Service Association Familiar dynamic human challenge response test content

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7958347B1 (en) * 2005-02-04 2011-06-07 F5 Networks, Inc. Methods and apparatus for implementing authentication
US20110002461A1 (en) * 2007-05-11 2011-01-06 Validity Sensors, Inc. Method and System for Electronically Securing an Electronic Biometric Device Using Physically Unclonable Functions
US20100176920A1 (en) * 2007-06-14 2010-07-15 Intrinsic Id Bv Method and device for providing digital security
US20130205370A1 (en) * 2012-02-07 2013-08-08 Avinash Kalgi Mobile human challenge-response test
US20140189828A1 (en) * 2012-12-28 2014-07-03 Davit Baghdasaryan System and method for processing random challenges within an authentication framework

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11429624B2 (en) * 2015-11-20 2022-08-30 Intrinsic Id B.V. Assigning device
US20180375670A1 (en) * 2017-06-21 2018-12-27 Commissariat A L'energie Atomique Et Aux Energies Alternatives Method for securing an integrated circuit during fabrication
US11038701B2 (en) * 2017-06-21 2021-06-15 Commissariat A L'energie Atomique Et Aux Energies Alternatives Method for securing an integrated circuit during fabrication

Also Published As

Publication number Publication date
US10057262B2 (en) 2018-08-21
EP3018607B1 (en) 2020-10-14
WO2015002271A1 (en) 2015-01-08
EP3018607A1 (en) 2016-05-11
JPWO2015002271A1 (en) 2017-02-23
JP6617556B2 (en) 2019-12-11
EP3018607A4 (en) 2017-03-01
CN105324777A (en) 2016-02-10

Similar Documents

Publication Publication Date Title
US10057262B2 (en) Device and authentication system
US10681025B2 (en) Systems and methods for securely managing biometric data
JP6629952B2 (en) Method and apparatus for securing mobile applications
US20140093144A1 (en) More-Secure Hardware Token
US9118643B2 (en) Authentication and data integrity protection of token
CN108282453B (en) Internet of things reading device, safe access method and control center equipment
US20150143545A1 (en) Function for the Challenge Derivation for Protecting Components in a Challenge-Response Authentication Protocol
US9549322B2 (en) Methods and systems for authentication of a communication device
KR101499906B1 (en) Smart card having OTP generation function and OTP authentication server
US10511946B2 (en) Dynamic secure messaging
KR102010764B1 (en) Computer security system and method using authentication function in smart phone
Abughazalah et al. Two rounds RFID grouping-proof protocol
US20160241557A1 (en) Method for secured communication between an operating system of a terminal and a device distinct from the terminal
EP2940647A1 (en) Method for processing issuance of mobile credit card
JP6790839B2 (en) Secure element, UIM card, authentication method, and authentication program
US9723483B2 (en) Mobile electronic device
Allen et al. Authenticating physical location using QR codes and network latency
KR101536122B1 (en) Secure User Authentication Scheme using SmartCard in Printer Security Device Method
CN110462596B (en) Communication device, information processing device, and data processing system
KR102021956B1 (en) Smart card based authentication system, device and method
US20160248762A1 (en) Wireless communication system, and one-time password generating and authenticating method
Vallent et al. Cryptanalysis of Flyweight RFID Authentication Protocol
KR20120082783A (en) Method for certificating product of ic chip module, and integrated circuit chip module
KR20110126074A (en) Rfid tag and interrogator for supporting normal mode and secure mode and the method thereof

Legal Events

Date Code Title Description
AS Assignment

Owner name: TOPPAN PRINTING CO., LTD., JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:YOKOYAMA, KIICHI;KOBAYASHI, MOYURU;REEL/FRAME:037321/0959

Effective date: 20151215

STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4